Role based approach to data access in adhoc networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we combine concepts of role-based access and databases to specify separation of duty (on wireless networks) as required for database integrity. Specifically, we consider adhoc network environment and discuss role access to network databases. We give a description of the methodology and role based model showing how roles can be assigned and how propagation of permissions is handled. Given this general approach, a system developer can design an authorization model for data access and transfer based on roles in an adhoc environment.

Original languageEnglish
Title of host publicationIEEE International Conference on Computer Systems and Applications, 2006
PublisherIEEE Computer Society
Pages1163-1166
Number of pages4
ISBN (Print)1424402123, 9781424402120
DOIs
Publication statusPublished - 2006
EventIEEE International Conference on Computer Systems and Applications, 2006 - Sharjah, United Arab Emirates
Duration: Mar 8 2006Mar 8 2006

Publication series

NameIEEE International Conference on Computer Systems and Applications, 2006
Volume2006

Other

OtherIEEE International Conference on Computer Systems and Applications, 2006
Country/TerritoryUnited Arab Emirates
CitySharjah
Period3/8/063/8/06

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Role based approach to data access in adhoc networks'. Together they form a unique fingerprint.

Cite this